Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 20:54
Behavioral task
behavioral1
Sample
b82ab617ef9b56acbea2b99cfaf46891.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b82ab617ef9b56acbea2b99cfaf46891.exe
Resource
win10v2004-20240226-en
General
-
Target
b82ab617ef9b56acbea2b99cfaf46891.exe
-
Size
1.5MB
-
MD5
b82ab617ef9b56acbea2b99cfaf46891
-
SHA1
b497189fea187d2f6f576f16c53301f108bb4654
-
SHA256
cafe4551a6346221e12ca47b92809409b1839cc28d400bdccaf7f78abf9780ca
-
SHA512
706c5503c056959bf05c75d55556a94084ab753c08862c86705f11ef0ecb7327ced6f9695a59db3def0930185ea008410e96bd6afc55a1c622c53d02e32238d9
-
SSDEEP
24576:+QER4cIl4WMUJTsDbdMenYPSEXlkyxSvDA0H7LSNTKHQPCW:+Q1qOTsDbdMeYPSEXXsvDA0b+NTKHQq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 b82ab617ef9b56acbea2b99cfaf46891.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 b82ab617ef9b56acbea2b99cfaf46891.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 b82ab617ef9b56acbea2b99cfaf46891.exe -
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012252-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2208 b82ab617ef9b56acbea2b99cfaf46891.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2208 b82ab617ef9b56acbea2b99cfaf46891.exe 2068 b82ab617ef9b56acbea2b99cfaf46891.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2068 2208 b82ab617ef9b56acbea2b99cfaf46891.exe 29 PID 2208 wrote to memory of 2068 2208 b82ab617ef9b56acbea2b99cfaf46891.exe 29 PID 2208 wrote to memory of 2068 2208 b82ab617ef9b56acbea2b99cfaf46891.exe 29 PID 2208 wrote to memory of 2068 2208 b82ab617ef9b56acbea2b99cfaf46891.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82ab617ef9b56acbea2b99cfaf46891.exe"C:\Users\Admin\AppData\Local\Temp\b82ab617ef9b56acbea2b99cfaf46891.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\b82ab617ef9b56acbea2b99cfaf46891.exeC:\Users\Admin\AppData\Local\Temp\b82ab617ef9b56acbea2b99cfaf46891.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD57351f2018a817cd3b0ecd6c0ab33a5dd
SHA17bb21d6858dd1dc5e4bc4a0b04a6c0dd670085ea
SHA2567b6c78ec0b73c1a7e77829620a48ea1f702e07b4ad6e9e904e654b0c3e6978c6
SHA5128fb162049dd0c5f49777efeca2f6b9733833cac26e1d384d496f6424090321bb47384ac8c7dc4a29099a2d00ad6ca9bdc4bf9e8b25b58872121bf3b86d8fd3d1